There are 15 repositories under privilege-escalation-exploits topic.
Linux privilege escalation auditing tool
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Collection of things made during my OSCP journey
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
整理一些内网常用渗透小工具
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Bypass UAC by hijacking a DLL located in the Native Image Cache
Linux Privilege Escalation Tool
system3, Samsung's worst nightmare for a 3rd time!
Bypass UAC by abusing the Internet Explorer Add-on installer
Linux & Android Kernel Vulnerability research and exploitation
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Privilege escalation in Docker
AppXSVC Service race condition - privilege escalation
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
x64 Windows privilege elevation using anycall
A centralized list of the various Potato Windows exploits.
privilege escalation POCs built in Rust.
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC by abusing shell protocol handlers
👻 Systematically Seizing SYSTEM Rights — Alternative to PSExec for SYSTEM privilege escalation through token theft.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
Proof-of-Concept of the ZombieLoad-Attack for a demonstration on Intel's i7-7700k using Windows 10 Pro
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader
Copy & paste from original code for support ALL Windows Versions
A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。